Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 01:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-11-19_394797ab6934f4db2364f672feed7669_ryuk.exe
Resource
win7-20240903-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-11-19_394797ab6934f4db2364f672feed7669_ryuk.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
15 signatures
150 seconds
General
-
Target
2024-11-19_394797ab6934f4db2364f672feed7669_ryuk.exe
-
Size
4.1MB
-
MD5
394797ab6934f4db2364f672feed7669
-
SHA1
f19b966c84f2547040650811be1f29ee8ac2c412
-
SHA256
ca130b3fce182c547d93de04d673c6456f16e1eb73ce941dc7dd2c3c7d62ae5b
-
SHA512
81030ea518cb7e0102b1a59c9e5e93af304ca1f6eea2e5fdcb120abbde4295b319eafed937941c7301df4848132c902dc8709af84f1725361c47400981ea110c
-
SSDEEP
49152:/xGK0l3e3uFX0o6GPR08YP5DbdMl9uItjeRisE8Z:/xGK09yuaZ
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2552 2384 2024-11-19_394797ab6934f4db2364f672feed7669_ryuk.exe 30 PID 2384 wrote to memory of 2552 2384 2024-11-19_394797ab6934f4db2364f672feed7669_ryuk.exe 30 PID 2384 wrote to memory of 2552 2384 2024-11-19_394797ab6934f4db2364f672feed7669_ryuk.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-19_394797ab6934f4db2364f672feed7669_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-19_394797ab6934f4db2364f672feed7669_ryuk.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\2024-11-19_394797ab6934f4db2364f672feed7669_ryuk.exeC:\Users\Admin\AppData\Local\Temp\2024-11-19_394797ab6934f4db2364f672feed7669_ryuk.exe2⤵PID:2552
-